Close
  • Français
  • English

Themes

(By Holger KNAPPENSCHNEIDER, Managing Partner at IDA Group) The usage of communications and disinformation with a strategic agenda is extraordinarily subtle in nature, and thus much more threatening. It hides behind Facebook, Google, tweets and chats, and appears to the reader primarily as the opinion of supposedly well-known counterparts.  This provides the opportunity for foreign…

Read More

(by Alix DESFORGES, GEODE) Cybersecurity has been largely excluded from technical training programmes in higher education. For several years now, the ANSSI, the Ministry of the Armed Forces and other cybersecurity stakeholders in France (industrialists, professional associations) have been warning of the blind spot that cybersecurity represents in technical training courses. This situation raises two main…

Read More

(by Jiří Šedivý, Chief Executive of the European Defence Agency) EU Member States have been working on Computer Security Incident Response Teams (CSIRTs) and Computer Emergency Response Teams (CERTs) for many years. Both civilian and military CERTs were created in various formats, capacities and missions, and they are located in various parts of government structures….

Read More

(by Deveryware) Data has become the black gold of the 21st century. There is a broad consensus on its new importance induced by the boom in digital technologies and connected objects, the number of which should be reach 1,000 billion by 2025, according to McKinsey Global Institute. The challenges brought about are summarized as the…

Read More